Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
Markus Jakobsson, Steven Myers
John Wiley & Sons, Dec 5, 2006 - Technology & Engineering - 739 pages
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures.
What people are saying - Write a review
We haven't found any reviews in the usual places.
algorithm Alice allows anti-phishing application authentication bank beneﬁts biometric browser cache cookies certiﬁcate client compromised conﬁdential information countermeasures credentials credit-card cryptographic deﬁned detect dictionary attack difﬁcult digital signatures display DKIM domain name eBay email address encryption example experiment ﬁeld Figure ﬁle ﬁltering ﬁnancial ﬁnd ﬁrst hash honeypots host identiﬁer identity identity theft implemented interaction interface Internet IP address keystroke legitimate login machine malicious malware man-in-the-middle attack Microsoft min-entropy operating system packet password PayPal phisher phishing attacks phishing email potential protect protocol proxy pseudonym public key recipient reputation system require rootkit router S/MIME Section sender server signature signed SMTP social network spam speciﬁc spoofed spooﬁng techniques toolbar trafﬁc trusted path usability USENIX user’s veriﬁcation victim vulnerable window